Please turn on your JavaScript for this page to function normally.
world in hand
Week in review: Securing ICS, and the reasons behind risky password practices

Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …

general virtual digital
Week in review: Yahoo breach, Tesla remote hijack, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news, reviews and articles: Repercussions of the massive Yahoo breach Yahoo has announced on Thursday …

Week in review: MySQL 0-day, Stingrays, and the end of Patch Tuesday

Here’s an overview of some of last week’s most interesting news and articles: Five ways to respond to the ransomware threat While organizations wrestle with the …

keyboard
Week in review: Stealing login credentials, secure mobile communications explained

Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: Rambler.ru hack: Passwords of nearly 100 million users exposed A …

talk speak speaker
Week in review: USBee, DNSSEC abuse, and IoT security research

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Linux servers hit with FairWare ransomware – or is it just a scam? Victims …

arrow
Week in review: iOS zero-days exploited, hacking cellphone towers and brain implants

Here’s an overview of some of last week’s most interesting news, reviews and articles: Backdoor uses TeamViewer to spy on victims A backdoor Trojan with spying …

earth
Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans

Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …

match
Week in review: Spoofing boarding pass QR codes, blocking USB-based threats

Here’s an overview of some of last week’s most interesting news, reviews and articles: Malware hidden in digitally signed executables can bypass AV protection …

general virtual digital
Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems

Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …

success
Week in review: Snooping Tor nodes, Wi-Fi keyboards open to keystroke sniffing

Here’s an overview of some of last week’s most interesting news, reviews and articles: Industry collaborates on automotive cybersecurity best practices More than …

abstract
Week in review: Pokémon GO, flawed code hooking engines, Ubuntu Forums hacked again

Here’s an overview of some of last week’s most interesting news and articles: Preparing for new EU cybersecurity rules and regulations The Network and Information …

abstract
Week in review: Anti-ransomware, Pokémon GO dangers, and a new anonymity system

Here’s an overview of some of last week’s most interesting news and articles: Researchers create effective anti-ransomware solution Are you willing to sacrifice a …

Don't miss

Cybersecurity news